US20080016021A1 - System and method of dynamically changing file representations - Google Patents

System and method of dynamically changing file representations Download PDF

Info

Publication number
US20080016021A1
US20080016021A1 US11/484,816 US48481606A US2008016021A1 US 20080016021 A1 US20080016021 A1 US 20080016021A1 US 48481606 A US48481606 A US 48481606A US 2008016021 A1 US2008016021 A1 US 2008016021A1
Authority
US
United States
Prior art keywords
file
access
representation
write
monitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/484,816
Other versions
US8019790B2 (en
Inventor
Aziz Gulbeden
Ramesh Radhakrishnan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dell Products LP
Original Assignee
Dell Products LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dell Products LP filed Critical Dell Products LP
Assigned to DELL PRODUCTS, LP reassignment DELL PRODUCTS, LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GULBEDEN, AZIZ, RADHAKRISHNAN, RAMESH
Priority to US11/484,816 priority Critical patent/US8019790B2/en
Priority to IE20070392A priority patent/IE20070392A1/en
Priority to TW096119511A priority patent/TWI368855B/en
Priority to SG200703951-4A priority patent/SG139626A1/en
Priority to DE102007026104.9A priority patent/DE102007026104B4/en
Priority to GB0822628A priority patent/GB2455424B/en
Priority to GB0712313A priority patent/GB2440020B/en
Priority to FR0705012A priority patent/FR2904128A1/en
Priority to CN2007101362226A priority patent/CN101105808B/en
Publication of US20080016021A1 publication Critical patent/US20080016021A1/en
Publication of US8019790B2 publication Critical patent/US8019790B2/en
Application granted granted Critical
Assigned to BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT reassignment BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT PATENT SECURITY AGREEMENT (NOTES) Assignors: APPASSURE SOFTWARE, INC., ASAP SOFTWARE EXPRESS, INC., BOOMI, INC., COMPELLENT TECHNOLOGIES, INC., CREDANT TECHNOLOGIES, INC., DELL INC., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL USA L.P., FORCE10 NETWORKS, INC., GALE TECHNOLOGIES, INC., PEROT SYSTEMS CORPORATION, SECUREWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT PATENT SECURITY AGREEMENT (ABL) Assignors: APPASSURE SOFTWARE, INC., ASAP SOFTWARE EXPRESS, INC., BOOMI, INC., COMPELLENT TECHNOLOGIES, INC., CREDANT TECHNOLOGIES, INC., DELL INC., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL USA L.P., FORCE10 NETWORKS, INC., GALE TECHNOLOGIES, INC., PEROT SYSTEMS CORPORATION, SECUREWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT (TERM LOAN) Assignors: APPASSURE SOFTWARE, INC., ASAP SOFTWARE EXPRESS, INC., BOOMI, INC., COMPELLENT TECHNOLOGIES, INC., CREDANT TECHNOLOGIES, INC., DELL INC., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL USA L.P., FORCE10 NETWORKS, INC., GALE TECHNOLOGIES, INC., PEROT SYSTEMS CORPORATION, SECUREWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to DELL INC., SECUREWORKS, INC., PEROT SYSTEMS CORPORATION, DELL SOFTWARE INC., COMPELLANT TECHNOLOGIES, INC., FORCE10 NETWORKS, INC., DELL PRODUCTS L.P., ASAP SOFTWARE EXPRESS, INC., APPASSURE SOFTWARE, INC., DELL USA L.P., CREDANT TECHNOLOGIES, INC., DELL MARKETING L.P., WYSE TECHNOLOGY L.L.C. reassignment DELL INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT
Assigned to COMPELLENT TECHNOLOGIES, INC., DELL USA L.P., CREDANT TECHNOLOGIES, INC., DELL MARKETING L.P., ASAP SOFTWARE EXPRESS, INC., SECUREWORKS, INC., WYSE TECHNOLOGY L.L.C., DELL PRODUCTS L.P., DELL INC., DELL SOFTWARE INC., APPASSURE SOFTWARE, INC., FORCE10 NETWORKS, INC., PEROT SYSTEMS CORPORATION reassignment COMPELLENT TECHNOLOGIES, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Assigned to WYSE TECHNOLOGY L.L.C., PEROT SYSTEMS CORPORATION, APPASSURE SOFTWARE, INC., CREDANT TECHNOLOGIES, INC., DELL SOFTWARE INC., DELL PRODUCTS L.P., DELL MARKETING L.P., DELL INC., SECUREWORKS, INC., DELL USA L.P., ASAP SOFTWARE EXPRESS, INC., FORCE10 NETWORKS, INC., COMPELLENT TECHNOLOGIES, INC. reassignment WYSE TECHNOLOGY L.L.C. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: ASAP SOFTWARE EXPRESS, INC., AVENTAIL LLC, CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL SYSTEMS CORPORATION, DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., MAGINATICS LLC, MOZY, INC., SCALEIO LLC, SPANNING CLOUD APPS LLC, WYSE TECHNOLOGY L.L.C.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT SECURITY AGREEMENT Assignors: ASAP SOFTWARE EXPRESS, INC., AVENTAIL LLC, CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL SYSTEMS CORPORATION, DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., MAGINATICS LLC, MOZY, INC., SCALEIO LLC, SPANNING CLOUD APPS LLC, WYSE TECHNOLOGY L.L.C.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. SECURITY AGREEMENT Assignors: CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. SECURITY AGREEMENT Assignors: CREDANT TECHNOLOGIES INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., WYSE TECHNOLOGY L.L.C.
Assigned to DELL SOFTWARE INC., FORCE10 NETWORKS, INC., WYSE TECHNOLOGY L.L.C., ASAP SOFTWARE EXPRESS, INC., EMC CORPORATION, SCALEIO LLC, DELL MARKETING L.P., MOZY, INC., DELL INTERNATIONAL, L.L.C., DELL USA L.P., DELL SYSTEMS CORPORATION, EMC IP Holding Company LLC, AVENTAIL LLC, MAGINATICS LLC, CREDANT TECHNOLOGIES, INC., DELL PRODUCTS L.P. reassignment DELL SOFTWARE INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Assigned to DELL PRODUCTS L.P., EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), SCALEIO LLC, DELL USA L.P., DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), DELL INTERNATIONAL L.L.C., DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.) reassignment DELL PRODUCTS L.P. RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001) Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT
Assigned to DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), DELL USA L.P., SCALEIO LLC, DELL INTERNATIONAL L.L.C., DELL PRODUCTS L.P., EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC) reassignment DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.) RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001) Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • G06F12/0866Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches for peripheral storage systems, e.g. disk cache
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • G06F16/1767Concurrency control, e.g. optimistic or pessimistic approaches
    • G06F16/1774Locking methods, e.g. locking methods for file systems allowing shared and concurrent access to files
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/36Monitoring, i.e. supervising the progress of recording or reproducing

Definitions

  • the present disclosure relates generally to distributed file systems. More specifically, the present disclosure relates to dynamically changing file representations within a distributed file system.
  • An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information.
  • information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated.
  • the variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications.
  • information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
  • Certain types of information handling systems can employ different file representation schemes, which can vary based on the type of system.
  • Some distributed file systems such as a parallel virtual file system (PVFS), can employ striping to improve performance for large operations.
  • Other systems can use a log or a journal based approach for speed and reliability.
  • Still other systems can use plain, or regular, files due to the relative simplicity of such files.
  • PVFS parallel virtual file system
  • Striping and parallel input/output (IO) operations work well for large file system operations. However, for small file system operations, striping increases the overhead and can result in relatively poor performance. For write intensive operations, log or journal based systems can result in relatively higher performance because these systems can use cache effectively and make writes sequentially. Read operations in such systems can incur more overhead.
  • Distributed file systems that support different file representation schemes can allow a user to manually make a decision on how a file should be stored. Other parameters, such as the stripe size, may be fixed or manually set by the user. These systems do not provide an automated way to make these decisions by the file system and not the user.
  • FIG. 1 is a general diagram illustrating an information handling system
  • FIG. 2 is a flow chart illustrating a method of monitoring files within an information handling system
  • FIG. 3 is a flow chart illustrating a method of dynamically changing file representations within an information handling system
  • FIG. 4 is a flow chart illustrating a method of preventing changes to file representations within an information handling system.
  • An information handling system can include a processor and a memory in communication with the processor. Further, a file access monitor can be embedded within the memory. The file access monitor can monitor one or more files within the information handling system and change a file representation associated with each of the one or more files based on access patterns associated with each of the one or more files.
  • an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes.
  • an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price.
  • the information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory.
  • Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display.
  • the information handling system may also include one or more buses operable to transmit communications between the various hardware components.
  • the information handling system 100 can include a network 102 .
  • the network 102 can be a wide area network (WAN), a local area network (LAN), or a combination thereof.
  • the system 100 can include a first user computer 104 , a second user computer 106 , and an Nth user computer 108 coupled to the network.
  • the first user computer 104 can include a processor 110 and a memory 112 coupled to the processor 110 .
  • the second user computer 106 can include a processor 114 and a memory 116 coupled to the processor 114 .
  • the Nth user computer 108 can include a processor 118 and a memory 120 coupled to the processor 118 .
  • the system 100 can further include a first file server 122 , a second file server 124 , and an Nth file server 126 coupled to the network.
  • the first file server 122 can include a processor 128 and a memory 130 coupled to the processor 128 .
  • the second file server 124 can include a processor 132 and a memory 134 coupled to the processor 132 .
  • the Nth file server 126 can include a processor 136 and a memory 138 coupled to the processor 136 .
  • the file servers 122 , 124 , 126 can be connected to the network 102 via a file manager server 140 .
  • the file manager server 140 can include a processor 142 and a memory 144 coupled to the processor 142 .
  • a file access monitor 146 can be embedded within the memory 144 of the file manager server 140 .
  • the file access monitor 146 can include logic that can be executed in order to manage one or more files that can be stored within the file servers 122 , 124 , 126 .
  • the file access monitor 146 can be embedded within the memory 130 , 134 , 138 of one of the other servers 122 , 124 , 126 . Further, the file access monitor 146 can be embedded within the memory 112 , 116 , 120 of one of the user computers 104 , 106 , 108 .
  • the files can be stored within the servers 122 , 124 , 126 as three different representations.
  • a particular file can be stored as a large file representation, a regular file representation, or a write file representation.
  • the large file representation can include a striped file representation in which the file can be divided into stripes and each stripe can be stored at a different server. Stripe size is a parameter than can be set, or defined, by a user.
  • the regular file representation indicates that the file is to be stored as is.
  • the write file representation is a representation of a file that is efficient for files that include frequent write operations.
  • the write file representation can include a log-structured file representation.
  • the file system monitor 146 can monitor the files within the system 100 at the file level without interruption. Further, based on file activity, the file system monitor 146 can choose a file representation for each file that substantially maximizes efficiency of the system 100 . The file system monitor 146 can monitor each file within the system 100 to determine whether a current file representation for each file is an optimal file representation. Also, the file system monitor 146 can determine an optimal file representation for each file based on the access characteristic for each file. Additionally, the file system monitor 146 can dynamically change a file representation for each file from a regular file representation to a large file representation, from a regular file representation to a write file representation, from a large file representation to a regular file representation, and from a write file representation to a regular file representation.
  • the file system monitor 146 when the file system monitor 146 determines that an access pattern for a particular file is suitable for a different file representation, the file system monitor 146 can automatically and dynamically change the file representation in order to increase the performance of the system 100 .
  • the file system monitor 146 can track metadata information, e.g., operation type, operation frequency, and file size associate with the operation, for every file that is created and stored in the system 100 .
  • the file system monitor 146 when the file system monitor 146 determines that access to a regular file is happening in large block sizes, the file system monitor 146 can convert the file from a regular file representation to a large file representation, e.g., to a striped file, in order to take advantage of parallel access.
  • the threshold to categorize an access size as large can be set beforehand by system designers, or the file system can use one or more heuristics to determine the threshold.
  • the file system monitor 146 determines that access to a large file is occurring at random offsets, the file system monitor 146 can convert the large file representation to a regular file representation. This conversion can minimize additional overhead by avoiding the need to connect multiple input/output servers to handle the large file representation.
  • the file system monitor 146 determines an amount of writes to a regular file is substantially greater than an amount of reads from the same regular file, the file system monitor 146 can convert the regular file to a write file representation, e.g., a log-structured file representation, in order to take advantage of sequential access to the memory. Additionally, when the file system monitor 146 determines that an amount of reads of a write file representation is substantially greater than an amount of writes to the same file, the file system monitor 146 can convert the write file representation to a regular file representation in order to reduce overhead associated with reading the log for the file.
  • a write file representation e.g., a log-structured file representation
  • the file system monitor 146 can perform the transition transparently. Thus, one or more applications accessing the file can continue to perform operations on the file while the transition occurs.
  • some limits can be placed on how frequently a file's representation can be changed. For example, a particular file may only be changed once or twice per every one thousand accesses through the use of a lock that avoids change in file representation operation for a predetermined period.
  • the file system monitor 146 may also delay transitions for a particular time in order to confirm a file access pattern. This can limit the number of transitions and can avoid the overhead penalty due to making incorrect decisions.
  • the threshold values, described herein, that can trigger changes between file representations can be set manually by the system engineers.
  • the file system monitor 146 can determine the thresholds values based on one or more heuristics. Further, the file system monitor 146 can wait to make a change to a file when there are not any open handles on the file in question. This can substantially eliminate overhead issues from a user's perspective and can ensure that the user does not have the file open for any operations. As such, the user can remain unaware of any transition of file representation.
  • the system 100 can determine an optimal representation scheme for the files stored therein and the system 100 can increase the efficiency of handling those files.
  • a method of monitoring one or more files is shown and commences at block 200 .
  • a file access monitor can access to a plurality of files within a system having one or more file servers, e.g., the system 100 described herein.
  • the file access monitor can determine whether a particular access includes a large file operation or a small file operation. In a particular embodiment, the access can be considered a large file operation if the access involves a block of data greater than or equal to one megabyte (1 MB).
  • the method continues to block 204 and a large/small access ratio can be increased.
  • the large/small access ratio can include a large access counter and a small access counter and the large/small access ratio can be increased by increasing the large access counter. Alternatively, the large/small access ratio can be increased by decreasing the small access counter.
  • the method can move to block 206 and the large/small ratio can be decreased. The large/small ratio can be decreased by increasing the small access counter. Alternatively, the large/small ratio can be decreased by decreasing the large access counter.
  • the method can continue to decision step 208 and the file access monitor can determine whether the access to the file includes a read operation or a write operation. If the file access includes a read operation, the method can proceed to block 210 and a read/write ratio can be increased.
  • the read/write access ratio can include a read access counter and a write access counter. Further, the read/write access ratio can be increased by increasing the read access counter. Alternatively, the read/write access ratio can be increased by decreasing the write access counter.
  • the method can move to block 212 and the read/write ratio can be decreased. The read/write ratio can be decreased by increasing the write access counter. Alternatively, the read/write ratio can be decreased by decreasing the read access counter.
  • the method can proceed to decision step 214 and the file access monitor can determine if access to the files has ended. If the access has not ended, the method can return to block 200 and continue as described herein. Otherwise, if the access has ended, the method can end at state 216 .
  • the file access monitor can monitor access to one or more files within the system 100 .
  • the file access monitor can determine a file representation associated with the file.
  • the file representation can be a large file representation, a regular file representation, or a write file representation.
  • the large file representation can be a striped file and the write file representation can be a log-structured file.
  • the method can proceed to decision step 304 , and the file access monitor can determine whether the access to the striped file is at random offsets. If not, the method moves to block 306 and the file access monitor maintains the file as a striped file. The method can then proceed to decision step 308 and the file access monitor can determine if access to the files in the system has ended. If not, the method can return to block 300 and continue as described herein. If access to the files ends, the method can end at state 310 .
  • the method can move to block 312 and the file access monitor can change the striped file to a regular file.
  • changing the striped file to a regular file can minimize additional overhead by avoiding the need to connect multiple input/output servers to handle the large file representation. From block 312 , the method can proceed to decision step 308 and continue as described herein.
  • the method can move to decision step 314 .
  • the file access monitor can determine if a large/small access ratio for the file is greater than a threshold.
  • the threshold can be five. If the large/small access ratio is greater than the threshold, the method can move to block 316 and the file access monitor can change the regular file to a striped file. Thereafter, the method can move to decision step 308 and continue as described herein.
  • the method can proceed to decision step 318 and the file access monitor can determine whether the read/write ratio is less than a threshold. If the read/write ratio is not less than the threshold, the method can continue to block 320 and the file access monitor can maintain the file as a regular file. The method can then move to decision step 308 and continue as described herein.
  • the method can proceed to block 322 and the file access monitor can change the regular file to a log-structured file.
  • the log-structured file representation can provide greater efficiency for write operations.
  • the read/write ratio decreases, it can be an indication that the access to the file includes greater write operations than read operations. From block 322 , the method can move to decision step 308 and continue as described herein.
  • the method can move to decision step 324 and the file access monitor can determine whether a read/write ratio associated with the log-structured file is greater than a threshold. If the read/write ratio is not greater than the threshold, the method can move to block 326 and the file access monitor can maintain the file as a log-structured file. The method can then move to decision step 308 and continue as described herein.
  • the method can move to block 328 and the file access monitor can change the log-structured file to a regular file. Thereafter, the method can move to decision step 308 and continue as described herein.
  • the method can be executed by a file access monitor, e.g., the file access monitor 146 shown and described above in conjunction with the system 100 .
  • the file access monitor can monitor each file within the system 100 .
  • the file access monitor can determine whether a transition lock is on a particular file to be accessed. If so, the method can move to decision step 404 and the file access monitor can determine whether the transition lock on the file is expired. If the transition lock is expired, the method can move to block 406 and the file access monitor can prevent a transition to another file representation.
  • the method can move to decision step 408 and the file access monitor can determine whether access to the files within the system has ended. If access ends, the method can end at state 410 . Otherwise, if the access continues, the method can return to block 400 and continue as described herein.
  • the method can proceed to decision step 412 .
  • the method can also proceed to decision step 412 from decision step 404 if the transition lock is expired.
  • the file access monitor can determine whether the access to the file has caused the file representation to change. For example, the file representation can change from a striped file to a regular file, from a regular file to a striped file, from a regular file to a log-structured file, or from a log-structured file to a regular file. If the access has not caused a change in file representation, the method can move to decision step 408 and continue as described herein.
  • the method can move to block 414 and the file access monitor can increase a transition counter for the file.
  • the file access monitor can determine whether the transition counter for the file is greater than a threshold. If the transition counter is not greater than the threshold, the method can move to decision step 408 and continue as described herein. Conversely, if the transition counter is greater than the threshold, the method can proceed to block 418 and the file access manager can put a transition lock on the file to prevent a transition to another file representation. Thereafter, the method can move to decision step 408 and continue as described herein.
  • the system and method can provide a system and method of dynamically changing file representations within a distributed file system.
  • the file representation can change from a striped file to a regular file, from a regular file to a striped file, from a regular file to a log-structured file, or from a log-structured file to a regular file.
  • the system can lock a particular file to prevent the file representation from changing too frequently.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

An information handling system is disclosed and can include a processor and a memory in communication with the processor. Further, a file access monitor can be embedded within the memory. The file access monitor can monitor one or more files within the information handling system and dynamically change a file representation associated with each of the one or more files based on access patterns associated with each of the one or more files.

Description

    FIELD OF THE DISCLOSURE
  • The present disclosure relates generally to distributed file systems. More specifically, the present disclosure relates to dynamically changing file representations within a distributed file system.
  • BACKGROUND
  • As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
  • Certain types of information handling systems, e.g., distributed file systems, can employ different file representation schemes, which can vary based on the type of system. Some distributed file systems, such as a parallel virtual file system (PVFS), can employ striping to improve performance for large operations. Other systems can use a log or a journal based approach for speed and reliability. Still other systems can use plain, or regular, files due to the relative simplicity of such files.
  • Striping and parallel input/output (IO) operations work well for large file system operations. However, for small file system operations, striping increases the overhead and can result in relatively poor performance. For write intensive operations, log or journal based systems can result in relatively higher performance because these systems can use cache effectively and make writes sequentially. Read operations in such systems can incur more overhead.
  • Distributed file systems that support different file representation schemes can allow a user to manually make a decision on how a file should be stored. Other parameters, such as the stripe size, may be fixed or manually set by the user. These systems do not provide an automated way to make these decisions by the file system and not the user.
  • Accordingly, there is a need for a system and method of dynamically changing file representations.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the Figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements. Embodiments incorporating teachings of the present disclosure are shown and described with respect to the drawings presented herein, in which:
  • FIG. 1 is a general diagram illustrating an information handling system;
  • FIG. 2 is a flow chart illustrating a method of monitoring files within an information handling system;
  • FIG. 3 is a flow chart illustrating a method of dynamically changing file representations within an information handling system; and
  • FIG. 4 is a flow chart illustrating a method of preventing changes to file representations within an information handling system.
  • The use of the same reference symbols in different drawings indicates similar or identical items.
  • DETAILED DESCRIPTION OF DRAWINGS
  • An information handling system is disclosed and can include a processor and a memory in communication with the processor. Further, a file access monitor can be embedded within the memory. The file access monitor can monitor one or more files within the information handling system and change a file representation associated with each of the one or more files based on access patterns associated with each of the one or more files.
  • As indicated above, the following description in combination with the Figures is provided to assist in understanding the teachings disclosed herein. The following discussion will focus on specific implementations and embodiments of the teachings. This focus is provided to assist in describing the teachings and should not be interpreted as a limitation on the scope or applicability of the teachings. For example, much of the following focuses on dynamically changing file representations within a distributed file systems. While the teachings may certainly be utilized in this application, the teachings may also be utilized in other applications and with several different types of architectures such as distributed computing architectures, client/server architectures, or middleware server architectures.
  • Referring initially to FIG. 1, an information handling system is shown and is generally designated 100. For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
  • In a particular embodiment, as shown in FIG. 1, the information handling system 100 can include a network 102. For example, the network 102 can be a wide area network (WAN), a local area network (LAN), or a combination thereof.
  • As illustrated in FIG. 1, the system 100 can include a first user computer 104, a second user computer 106, and an Nth user computer 108 coupled to the network. The first user computer 104 can include a processor 110 and a memory 112 coupled to the processor 110. The second user computer 106 can include a processor 114 and a memory 116 coupled to the processor 114. Additionally, the Nth user computer 108 can include a processor 118 and a memory 120 coupled to the processor 118.
  • The system 100 can further include a first file server 122, a second file server 124, and an Nth file server 126 coupled to the network. The first file server 122 can include a processor 128 and a memory 130 coupled to the processor 128. The second file server 124 can include a processor 132 and a memory 134 coupled to the processor 132. Moreover, the Nth file server 126 can include a processor 136 and a memory 138 coupled to the processor 136. In a particular embodiment, the file servers 122, 124, 126 can be connected to the network 102 via a file manager server 140. The file manager server 140 can include a processor 142 and a memory 144 coupled to the processor 142. A file access monitor 146 can be embedded within the memory 144 of the file manager server 140. The file access monitor 146 can include logic that can be executed in order to manage one or more files that can be stored within the file servers 122, 124, 126.
  • In an alternative embodiment, the file access monitor 146 can be embedded within the memory 130, 134, 138 of one of the other servers 122, 124, 126. Further, the file access monitor 146 can be embedded within the memory 112, 116, 120 of one of the user computers 104, 106, 108.
  • In a particular embodiment, the files can be stored within the servers 122, 124, 126 as three different representations. For example, a particular file can be stored as a large file representation, a regular file representation, or a write file representation. The large file representation can include a striped file representation in which the file can be divided into stripes and each stripe can be stored at a different server. Stripe size is a parameter than can be set, or defined, by a user. The regular file representation indicates that the file is to be stored as is. The write file representation is a representation of a file that is efficient for files that include frequent write operations. The write file representation can include a log-structured file representation.
  • The file system monitor 146 can monitor the files within the system 100 at the file level without interruption. Further, based on file activity, the file system monitor 146 can choose a file representation for each file that substantially maximizes efficiency of the system 100. The file system monitor 146 can monitor each file within the system 100 to determine whether a current file representation for each file is an optimal file representation. Also, the file system monitor 146 can determine an optimal file representation for each file based on the access characteristic for each file. Additionally, the file system monitor 146 can dynamically change a file representation for each file from a regular file representation to a large file representation, from a regular file representation to a write file representation, from a large file representation to a regular file representation, and from a write file representation to a regular file representation.
  • In a particular embodiment, when the file system monitor 146 determines that an access pattern for a particular file is suitable for a different file representation, the file system monitor 146 can automatically and dynamically change the file representation in order to increase the performance of the system 100. The file system monitor 146 can track metadata information, e.g., operation type, operation frequency, and file size associate with the operation, for every file that is created and stored in the system 100.
  • Also, in a particular embodiment, when the file system monitor 146 determines that access to a regular file is happening in large block sizes, the file system monitor 146 can convert the file from a regular file representation to a large file representation, e.g., to a striped file, in order to take advantage of parallel access. The threshold to categorize an access size as large can be set beforehand by system designers, or the file system can use one or more heuristics to determine the threshold. When the file system monitor 146 determines that access to a large file is occurring at random offsets, the file system monitor 146 can convert the large file representation to a regular file representation. This conversion can minimize additional overhead by avoiding the need to connect multiple input/output servers to handle the large file representation.
  • Further, when the file system monitor 146 determines an amount of writes to a regular file is substantially greater than an amount of reads from the same regular file, the file system monitor 146 can convert the regular file to a write file representation, e.g., a log-structured file representation, in order to take advantage of sequential access to the memory. Additionally, when the file system monitor 146 determines that an amount of reads of a write file representation is substantially greater than an amount of writes to the same file, the file system monitor 146 can convert the write file representation to a regular file representation in order to reduce overhead associated with reading the log for the file.
  • When the decision is made to change the way a file is stored, the file system monitor 146 can perform the transition transparently. Thus, one or more applications accessing the file can continue to perform operations on the file while the transition occurs. In order to reduce the penalty due to the overhead incurred while changing the way a file is represented, some limits can be placed on how frequently a file's representation can be changed. For example, a particular file may only be changed once or twice per every one thousand accesses through the use of a lock that avoids change in file representation operation for a predetermined period.
  • The file system monitor 146 may also delay transitions for a particular time in order to confirm a file access pattern. This can limit the number of transitions and can avoid the overhead penalty due to making incorrect decisions. In a particular embodiment, the threshold values, described herein, that can trigger changes between file representations can be set manually by the system engineers. Alternatively, the file system monitor 146 can determine the thresholds values based on one or more heuristics. Further, the file system monitor 146 can wait to make a change to a file when there are not any open handles on the file in question. This can substantially eliminate overhead issues from a user's perspective and can ensure that the user does not have the file open for any operations. As such, the user can remain unaware of any transition of file representation.
  • Using the methods described herein, the system 100 can determine an optimal representation scheme for the files stored therein and the system 100 can increase the efficiency of handling those files.
  • Referring to FIG. 2, a method of monitoring one or more files is shown and commences at block 200. At block 200, a file access monitor can access to a plurality of files within a system having one or more file servers, e.g., the system 100 described herein. At decision step 202, the file access monitor can determine whether a particular access includes a large file operation or a small file operation. In a particular embodiment, the access can be considered a large file operation if the access involves a block of data greater than or equal to one megabyte (1 MB).
  • At decision step 202, if the access includes a large file operation, the method continues to block 204 and a large/small access ratio can be increased. The large/small access ratio can include a large access counter and a small access counter and the large/small access ratio can be increased by increasing the large access counter. Alternatively, the large/small access ratio can be increased by decreasing the small access counter. At decision step 202, if the access includes a small file operation, the method can move to block 206 and the large/small ratio can be decreased. The large/small ratio can be decreased by increasing the small access counter. Alternatively, the large/small ratio can be decreased by decreasing the large access counter.
  • From block 204 or block 206, the method can continue to decision step 208 and the file access monitor can determine whether the access to the file includes a read operation or a write operation. If the file access includes a read operation, the method can proceed to block 210 and a read/write ratio can be increased. The read/write access ratio can include a read access counter and a write access counter. Further, the read/write access ratio can be increased by increasing the read access counter. Alternatively, the read/write access ratio can be increased by decreasing the write access counter. At decision step 208, if the access includes a write file operation, the method can move to block 212 and the read/write ratio can be decreased. The read/write ratio can be decreased by increasing the write access counter. Alternatively, the read/write ratio can be decreased by decreasing the read access counter.
  • From block 210 or block 212, the method can proceed to decision step 214 and the file access monitor can determine if access to the files has ended. If the access has not ended, the method can return to block 200 and continue as described herein. Otherwise, if the access has ended, the method can end at state 216.
  • Referring now to FIG. 3, a method of dynamically changing file representations is shown. The method can be executed by a file access monitor, e.g., the file access monitor 146 shown and described above in conjunction with the system 100. Commencing at block 300, the file access monitor can monitor access to one or more files within the system 100. At decision step 302, the file access monitor can determine a file representation associated with the file. For example, the file representation can be a large file representation, a regular file representation, or a write file representation. Further, the large file representation can be a striped file and the write file representation can be a log-structured file.
  • If the file is a striped file, the method can proceed to decision step 304, and the file access monitor can determine whether the access to the striped file is at random offsets. If not, the method moves to block 306 and the file access monitor maintains the file as a striped file. The method can then proceed to decision step 308 and the file access monitor can determine if access to the files in the system has ended. If not, the method can return to block 300 and continue as described herein. If access to the files ends, the method can end at state 310.
  • Returning to decision step 304, if the access to the striped file is at random offsets, the method can move to block 312 and the file access monitor can change the striped file to a regular file. In a particular embodiment, changing the striped file to a regular file can minimize additional overhead by avoiding the need to connect multiple input/output servers to handle the large file representation. From block 312, the method can proceed to decision step 308 and continue as described herein.
  • Returning to decision step 302, if the file is a regular file, the method can move to decision step 314. At decision step 314, the file access monitor can determine if a large/small access ratio for the file is greater than a threshold. For example, the threshold can be five. If the large/small access ratio is greater than the threshold, the method can move to block 316 and the file access monitor can change the regular file to a striped file. Thereafter, the method can move to decision step 308 and continue as described herein.
  • At decision step 314, if the large/small access ratio is less than the threshold, the method can proceed to decision step 318 and the file access monitor can determine whether the read/write ratio is less than a threshold. If the read/write ratio is not less than the threshold, the method can continue to block 320 and the file access monitor can maintain the file as a regular file. The method can then move to decision step 308 and continue as described herein.
  • Returning to decision step 318, if the read/write ratio is less than the threshold, the method can proceed to block 322 and the file access monitor can change the regular file to a log-structured file. In a particular embodiment, the log-structured file representation can provide greater efficiency for write operations. Further, as the read/write ratio decreases, it can be an indication that the access to the file includes greater write operations than read operations. From block 322, the method can move to decision step 308 and continue as described herein.
  • Returning to decision step 302, if the file representation is log-structured, the method can move to decision step 324 and the file access monitor can determine whether a read/write ratio associated with the log-structured file is greater than a threshold. If the read/write ratio is not greater than the threshold, the method can move to block 326 and the file access monitor can maintain the file as a log-structured file. The method can then move to decision step 308 and continue as described herein.
  • At decision step 324, if the read/write ratio is greater than the threshold, the method can move to block 328 and the file access monitor can change the log-structured file to a regular file. Thereafter, the method can move to decision step 308 and continue as described herein.
  • Referring to FIG. 4, a method of preventing file representation transition is shown. In a particular embodiment, the method can be executed by a file access monitor, e.g., the file access monitor 146 shown and described above in conjunction with the system 100. Commencing at block 400, the file access monitor can monitor each file within the system 100. At decision step 402, the file access monitor can determine whether a transition lock is on a particular file to be accessed. If so, the method can move to decision step 404 and the file access monitor can determine whether the transition lock on the file is expired. If the transition lock is expired, the method can move to block 406 and the file access monitor can prevent a transition to another file representation. Thereafter, the method can move to decision step 408 and the file access monitor can determine whether access to the files within the system has ended. If access ends, the method can end at state 410. Otherwise, if the access continues, the method can return to block 400 and continue as described herein.
  • At decision step 402, if a transition lock is not on a file, the method can proceed to decision step 412. The method can also proceed to decision step 412 from decision step 404 if the transition lock is expired.
  • At decision step 412, the file access monitor can determine whether the access to the file has caused the file representation to change. For example, the file representation can change from a striped file to a regular file, from a regular file to a striped file, from a regular file to a log-structured file, or from a log-structured file to a regular file. If the access has not caused a change in file representation, the method can move to decision step 408 and continue as described herein.
  • At decision step 412, if the access causes the file representation to change, the method can move to block 414 and the file access monitor can increase a transition counter for the file. Moving to decision step 416, the file access monitor can determine whether the transition counter for the file is greater than a threshold. If the transition counter is not greater than the threshold, the method can move to decision step 408 and continue as described herein. Conversely, if the transition counter is greater than the threshold, the method can proceed to block 418 and the file access manager can put a transition lock on the file to prevent a transition to another file representation. Thereafter, the method can move to decision step 408 and continue as described herein.
  • With the configuration of structure described herein, the system and method can provide a system and method of dynamically changing file representations within a distributed file system. For example, the file representation can change from a striped file to a regular file, from a regular file to a striped file, from a regular file to a log-structured file, or from a log-structured file to a regular file. Further, the system can lock a particular file to prevent the file representation from changing too frequently.
  • The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments that fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.

Claims (20)

1. A method of dynamically changing a file representation, comprising:
monitoring access to a file; and
determining whether access to the file includes a large file operation or a small file operation.
2. The method of claim 1, further comprising:
increasing the large/small access ratio for the file when access to the file includes the large file operation; and
decreasing the large/small access ratio for the file when access to the file includes the small file operation.
3. The method of claim 1, further comprising:
determining whether access to the file includes a read operation or a write operation;
decreasing a read/write ratio when access to the file includes the write operation; and
increasing the read/write ratio when access to the file includes the read operation.
4. The method of claim 3, further comprising determining a file representation.
5. The method of claim 4, further comprising changing the file representation from a large file representation to a regular file representation when the access to the file is at random offsets.
6. The method of claim 4, further comprising changing the file representation from a regular file representation to a large file representation when the large/small access ratio is greater than a threshold.
7. The method of claim 4, further comprising changing the file representation from a regular file representation to a write file representation when the read/write ratio is less than a threshold.
8. The method of claim 4, further comprising changing the file representation from a write file representation to a regular file representation when the read/write ration is greater than a threshold.
9. A method of preventing file transitions, comprising:
determining whether a transition lock is in place on a file; and
allowing a change in a file representation associated with the file when the transition lock is not in place.
10. The method of claim 9, further comprising:
determining whether the transition lock is expired;
allowing a change in a file representation associated with the file when the transition lock is expired; and
preventing a change in a file representation associated with the file when the transition lock is not expired.
11. The method of claim 9, further comprising:
increasing a transition counter for the file when the file representation changes; and
locking the file to prevent a change in the file representation when the transition counter is greater than a threshold.
12. An information handling system, comprising:
a processor;
a memory in communication with the processor; and
a file access monitor embedded within the memory, wherein the file access monitor is configured to monitor one or more files within the information handling system and dynamically change a file representation associated with each of the one or more files based on access patterns associated with each of the one or more files.
13. The system of claim 12, wherein the file access monitor comprises logic to:
monitor access to each of the one or more files; and
determine whether access to the file includes a large file operation or a small file operation.
14. The system of claim 13, wherein the file access monitor further comprises logic to:
increase the large/small access ratio for the file when access to the file includes the large file operation; and
decrease the large/small access ratio for the file when access to the file includes the small file operation.
15. The system of claim 14, wherein the file access monitor further comprises logic to:
determine whether access to the file includes a read operation or a write operation;
decrease a read/write ratio when access to the file includes the write operation; and
increase the read/write ratio when access to the file includes the read operation.
16. The system of claim 15, wherein the file access monitor further comprises logic to:
determine a file representation;
change the file representation from a large file representation to a regular file representation when the access to the file is at random offsets;
change the file representation from a regular file representation to a large file representation when the large/small access ratio is greater than a threshold;
change the file representation from a regular file representation to a write file representation when the read/write ratio falls is less than a threshold; and
change the file representation from a write file representation to a regular file representation when the read/write ration is greater than a threshold.
17. The system of claim 12, wherein the file access monitor further comprises logic to:
determine whether a transition lock is in place on a file; and
allow a change in a file representation associated with the file when the transition lock is not in place.
18. The system of claim 17, wherein the file access monitor further comprises logic to:
determine whether the transition lock is expired; and
allow a change in a file representation associated with the file when the transition lock is expired.
19. The system of claim 12, wherein the file access monitor further comprises logic to increase a transition counter for the file when the file representation changes.
20. The system of claim 19, wherein the file access monitor further comprises logic to prevent a change in the file representation when the transition counter is greater than a threshold.
US11/484,816 2006-07-11 2006-07-11 System and method of dynamically changing file representations Active 2027-04-25 US8019790B2 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
US11/484,816 US8019790B2 (en) 2006-07-11 2006-07-11 System and method of dynamically changing file representations
IE20070392A IE20070392A1 (en) 2006-07-11 2007-05-30 System and method of dynamically changing file representations
TW096119511A TWI368855B (en) 2006-07-11 2007-05-31 Method of dynamically changing file representations, method of preventing file transitions, and information handling system
SG200703951-4A SG139626A1 (en) 2006-07-11 2007-06-04 System and method of dynamically changing file representations
DE102007026104.9A DE102007026104B4 (en) 2006-07-11 2007-06-05 Methods for dynamically changing a file representation, methods for preventing file transitions and an information system
GB0712313A GB2440020B (en) 2006-07-11 2007-06-25 System and method of dynamically changing file representations
GB0822628A GB2455424B (en) 2006-07-11 2007-06-25 System and method of dynamically changing file representations
FR0705012A FR2904128A1 (en) 2006-07-11 2007-07-11 SYSTEM AND METHOD FOR DYNAMICALLY CHANGING A FILE.
CN2007101362226A CN101105808B (en) 2006-07-11 2007-07-11 System and method of dynamically changing file representations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/484,816 US8019790B2 (en) 2006-07-11 2006-07-11 System and method of dynamically changing file representations

Publications (2)

Publication Number Publication Date
US20080016021A1 true US20080016021A1 (en) 2008-01-17
US8019790B2 US8019790B2 (en) 2011-09-13

Family

ID=38352892

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/484,816 Active 2027-04-25 US8019790B2 (en) 2006-07-11 2006-07-11 System and method of dynamically changing file representations

Country Status (8)

Country Link
US (1) US8019790B2 (en)
CN (1) CN101105808B (en)
DE (1) DE102007026104B4 (en)
FR (1) FR2904128A1 (en)
GB (2) GB2455424B (en)
IE (1) IE20070392A1 (en)
SG (1) SG139626A1 (en)
TW (1) TWI368855B (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100153341A1 (en) * 2008-12-17 2010-06-17 Sap Ag Selectable data migration
US20110153674A1 (en) * 2009-12-18 2011-06-23 Microsoft Corporation Data storage including storing of page identity and logical relationships between pages
US20130262813A1 (en) * 2012-03-30 2013-10-03 Fujitsu Limited Storage control apparatus, storage system, and storage control method
US8626917B2 (en) * 2012-03-16 2014-01-07 Sap Ag File access using counter locking mechanism
CN103605726A (en) * 2013-11-15 2014-02-26 中安消技术有限公司 Method and system for accessing small files, control node and storage node
US8788533B2 (en) * 2012-10-26 2014-07-22 Sap Ag Read access logging
US20160026388A1 (en) * 2014-07-24 2016-01-28 Samsung Electronics Co., Ltd. Data storage device and method of processing data thereof
US20160292084A1 (en) * 2010-09-02 2016-10-06 International Business Machines Corporation Caching scheme synergy for extent migration between tiers of a storage system
US20170262638A1 (en) * 2015-09-25 2017-09-14 Eliot Horowitz Distributed database systems and methods with encrypted storage engines
US10698775B2 (en) 2016-05-31 2020-06-30 Mongodb, Inc. Method and apparatus for reading and writing committed data
US10713275B2 (en) 2015-07-02 2020-07-14 Mongodb, Inc. System and method for augmenting consensus election in a distributed database
US10713280B2 (en) 2010-12-23 2020-07-14 Mongodb, Inc. Systems and methods for managing distributed database deployments
US10740353B2 (en) 2010-12-23 2020-08-11 Mongodb, Inc. Systems and methods for managing distributed database deployments
US10740355B2 (en) 2011-04-01 2020-08-11 Mongodb, Inc. System and method for optimizing data migration in a partitioned database
US10776220B2 (en) 2016-06-27 2020-09-15 Mongodb, Inc. Systems and methods for monitoring distributed database deployments
US10846305B2 (en) 2010-12-23 2020-11-24 Mongodb, Inc. Large distributed database clustering systems and methods
US10866868B2 (en) 2017-06-20 2020-12-15 Mongodb, Inc. Systems and methods for optimization of database operations
US10872095B2 (en) 2012-07-26 2020-12-22 Mongodb, Inc. Aggregation framework system architecture and method
US10977277B2 (en) 2010-12-23 2021-04-13 Mongodb, Inc. Systems and methods for database zone sharding and API integration
US10990590B2 (en) 2012-07-26 2021-04-27 Mongodb, Inc. Aggregation framework system architecture and method
US10997211B2 (en) 2010-12-23 2021-05-04 Mongodb, Inc. Systems and methods for database zone sharding and API integration
US11222043B2 (en) 2010-12-23 2022-01-11 Mongodb, Inc. System and method for determining consensus within a distributed database
US11288282B2 (en) 2015-09-25 2022-03-29 Mongodb, Inc. Distributed database systems and methods with pluggable storage engines
US11394532B2 (en) 2015-09-25 2022-07-19 Mongodb, Inc. Systems and methods for hierarchical key management in encrypted distributed databases
US11403317B2 (en) 2012-07-26 2022-08-02 Mongodb, Inc. Aggregation framework system architecture and method
US20220292061A1 (en) * 2021-03-15 2022-09-15 Vmware, Inc. Optimizing file access statistics collection
US11544288B2 (en) 2010-12-23 2023-01-03 Mongodb, Inc. Systems and methods for managing distributed database deployments
US11544284B2 (en) 2012-07-26 2023-01-03 Mongodb, Inc. Aggregation framework system architecture and method
US11615115B2 (en) 2010-12-23 2023-03-28 Mongodb, Inc. Systems and methods for managing distributed database deployments

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119782A1 (en) * 2007-11-07 2009-05-07 Sandisk Il Ltd. Method and device for digital rights protection
US8255373B2 (en) * 2008-10-24 2012-08-28 Microsoft Corporation Atomic multiple modification of data in a distributed storage system
US8171219B2 (en) * 2009-03-31 2012-05-01 Intel Corporation Method and system to perform caching based on file-level heuristics
US8996887B2 (en) * 2012-02-24 2015-03-31 Google Inc. Log structured volume encryption for virtual machines
TWI626584B (en) * 2016-02-23 2018-06-11 宏碁股份有限公司 Methods for smart disk monitoring and apparatuses using the same
US11232068B2 (en) 2017-03-27 2022-01-25 Microsoft Technology Licensing, Llc Unified document retention management system
US20180276232A1 (en) * 2017-03-27 2018-09-27 Microsoft Technology Licensing, Llc Enhanced administrative controls for a unified file retention management system

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5333311A (en) * 1990-12-10 1994-07-26 Alsoft, Inc. Optimizing a magnetic disk by allocating files by the frequency a file is accessed/updated or by designating a file to a fixed location on a disk
US5608890A (en) * 1992-07-02 1997-03-04 International Business Machines Corporation Data set level cache optimization
US6272235B1 (en) * 1997-03-03 2001-08-07 Bacus Research Laboratories, Inc. Method and apparatus for creating a virtual microscope slide
US6374056B1 (en) * 1999-03-19 2002-04-16 Fuji Photo Optical Co., Ltd. Camera with magnetic recording device
US6389420B1 (en) * 1999-09-30 2002-05-14 Emc Corporation File manager providing distributed locking and metadata management for shared data access by clients relinquishing locks after time period expiration
US6442682B1 (en) * 1999-02-18 2002-08-27 Auspex Systems, Inc. Characterization of data access using file system
US6487633B1 (en) * 1999-05-03 2002-11-26 3Ware, Inc. Methods and systems for accessing disks using forward and reverse seeks
US20030005248A1 (en) * 2000-06-19 2003-01-02 Selkirk Stephen S. Apparatus and method for instant copy of data
US20030210790A1 (en) * 2002-05-08 2003-11-13 Erik Riedel Optimizing costs associated with managing encrypted data
US20040083339A1 (en) * 1996-04-08 2004-04-29 Yasutomo Yamamoto Apparatus and method for reallocating logical to physical disk devices using a storage controller, with access frequency and sequential access ratio calculations and display
US6810200B1 (en) * 1999-04-14 2004-10-26 Matsushita Electric Industrial Co., Ltd. Digital data processing device that restricts usage of data present on a recording medium
US6889249B2 (en) * 2001-01-11 2005-05-03 Z-Force, Inc. Transaction aggregation in a switched file system
US20050193216A1 (en) * 2004-03-01 2005-09-01 Melanie Gurda Methods, systems, and computer program products for detecting the presence of an installation on a data processing system based on the relative storage locations of one or more files
US20050198209A1 (en) * 2003-07-10 2005-09-08 Computer Associates Think, Inc. Single point of entry for web applications
US20060080365A1 (en) * 2004-10-13 2006-04-13 Glover Frederick S Transparent migration of files among various types of storage volumes based on file access properties

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5257370A (en) 1989-08-29 1993-10-26 Microsoft Corporation Method and system for optimizing data caching in a disk-based computer system
JPH0883202A (en) 1994-09-14 1996-03-26 Toshiba Corp Electronic filing device
FR2766269B1 (en) * 1997-07-18 1999-10-01 Framatome Sa EDGE CURRENT PROBE FOR NON-DESTRUCTIVE TUBE WALL CONTROL AND PROBE SIGNAL PROCESSING METHOD
US7246119B2 (en) * 2002-03-08 2007-07-17 Kabushiki Kaisha Toshiba Method and implementation of session-based file locking for network applications
JP2003296152A (en) 2002-03-29 2003-10-17 Toshiba Corp Hsm system and migration control method for the system
US6990656B2 (en) 2002-06-27 2006-01-24 Microsoft Corporation Dynamic metabase store
EP1677306A1 (en) 2005-01-04 2006-07-05 Deutsche Thomson-Brandt Gmbh Method for changing operation on a storage medium from a current file system to a new or updated file system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5333311A (en) * 1990-12-10 1994-07-26 Alsoft, Inc. Optimizing a magnetic disk by allocating files by the frequency a file is accessed/updated or by designating a file to a fixed location on a disk
US5608890A (en) * 1992-07-02 1997-03-04 International Business Machines Corporation Data set level cache optimization
US20040083339A1 (en) * 1996-04-08 2004-04-29 Yasutomo Yamamoto Apparatus and method for reallocating logical to physical disk devices using a storage controller, with access frequency and sequential access ratio calculations and display
US6272235B1 (en) * 1997-03-03 2001-08-07 Bacus Research Laboratories, Inc. Method and apparatus for creating a virtual microscope slide
US6442682B1 (en) * 1999-02-18 2002-08-27 Auspex Systems, Inc. Characterization of data access using file system
US6374056B1 (en) * 1999-03-19 2002-04-16 Fuji Photo Optical Co., Ltd. Camera with magnetic recording device
US6810200B1 (en) * 1999-04-14 2004-10-26 Matsushita Electric Industrial Co., Ltd. Digital data processing device that restricts usage of data present on a recording medium
US6487633B1 (en) * 1999-05-03 2002-11-26 3Ware, Inc. Methods and systems for accessing disks using forward and reverse seeks
US6389420B1 (en) * 1999-09-30 2002-05-14 Emc Corporation File manager providing distributed locking and metadata management for shared data access by clients relinquishing locks after time period expiration
US20030005248A1 (en) * 2000-06-19 2003-01-02 Selkirk Stephen S. Apparatus and method for instant copy of data
US6889249B2 (en) * 2001-01-11 2005-05-03 Z-Force, Inc. Transaction aggregation in a switched file system
US20030210790A1 (en) * 2002-05-08 2003-11-13 Erik Riedel Optimizing costs associated with managing encrypted data
US20050198209A1 (en) * 2003-07-10 2005-09-08 Computer Associates Think, Inc. Single point of entry for web applications
US20050193216A1 (en) * 2004-03-01 2005-09-01 Melanie Gurda Methods, systems, and computer program products for detecting the presence of an installation on a data processing system based on the relative storage locations of one or more files
US20060080365A1 (en) * 2004-10-13 2006-04-13 Glover Frederick S Transparent migration of files among various types of storage volumes based on file access properties

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9361326B2 (en) * 2008-12-17 2016-06-07 Sap Se Selectable data migration
US20100153341A1 (en) * 2008-12-17 2010-06-17 Sap Ag Selectable data migration
US20110153674A1 (en) * 2009-12-18 2011-06-23 Microsoft Corporation Data storage including storing of page identity and logical relationships between pages
US9760500B2 (en) * 2010-09-02 2017-09-12 International Business Machines Corporation Caching scheme synergy for extent migration between tiers of a storage system
US20160292084A1 (en) * 2010-09-02 2016-10-06 International Business Machines Corporation Caching scheme synergy for extent migration between tiers of a storage system
US10997211B2 (en) 2010-12-23 2021-05-04 Mongodb, Inc. Systems and methods for database zone sharding and API integration
US10740353B2 (en) 2010-12-23 2020-08-11 Mongodb, Inc. Systems and methods for managing distributed database deployments
US11222043B2 (en) 2010-12-23 2022-01-11 Mongodb, Inc. System and method for determining consensus within a distributed database
US10846305B2 (en) 2010-12-23 2020-11-24 Mongodb, Inc. Large distributed database clustering systems and methods
US11615115B2 (en) 2010-12-23 2023-03-28 Mongodb, Inc. Systems and methods for managing distributed database deployments
US11544288B2 (en) 2010-12-23 2023-01-03 Mongodb, Inc. Systems and methods for managing distributed database deployments
US10977277B2 (en) 2010-12-23 2021-04-13 Mongodb, Inc. Systems and methods for database zone sharding and API integration
US10713280B2 (en) 2010-12-23 2020-07-14 Mongodb, Inc. Systems and methods for managing distributed database deployments
US10740355B2 (en) 2011-04-01 2020-08-11 Mongodb, Inc. System and method for optimizing data migration in a partitioned database
US9418239B2 (en) 2012-03-16 2016-08-16 Sap Se File access using counter locking mechanism
US8626917B2 (en) * 2012-03-16 2014-01-07 Sap Ag File access using counter locking mechanism
US20130262813A1 (en) * 2012-03-30 2013-10-03 Fujitsu Limited Storage control apparatus, storage system, and storage control method
US9507703B2 (en) * 2012-03-30 2016-11-29 Fujitsu Limited Storage control apparatus, storage system, and storage control method to adjust RAID system strip size
US10990590B2 (en) 2012-07-26 2021-04-27 Mongodb, Inc. Aggregation framework system architecture and method
US11544284B2 (en) 2012-07-26 2023-01-03 Mongodb, Inc. Aggregation framework system architecture and method
US10872095B2 (en) 2012-07-26 2020-12-22 Mongodb, Inc. Aggregation framework system architecture and method
US11403317B2 (en) 2012-07-26 2022-08-02 Mongodb, Inc. Aggregation framework system architecture and method
US8788533B2 (en) * 2012-10-26 2014-07-22 Sap Ag Read access logging
CN103605726A (en) * 2013-11-15 2014-02-26 中安消技术有限公司 Method and system for accessing small files, control node and storage node
KR20160013351A (en) * 2014-07-24 2016-02-04 삼성전자주식회사 Storage device and data porcessing method thereof
US10353587B2 (en) * 2014-07-24 2019-07-16 Samsung Electronics Co., Ltd. Data storage device and method of processing data thereof
US20160026388A1 (en) * 2014-07-24 2016-01-28 Samsung Electronics Co., Ltd. Data storage device and method of processing data thereof
KR102330389B1 (en) 2014-07-24 2021-11-24 삼성전자주식회사 Storage device and data porcessing method thereof
US10713275B2 (en) 2015-07-02 2020-07-14 Mongodb, Inc. System and method for augmenting consensus election in a distributed database
US11288282B2 (en) 2015-09-25 2022-03-29 Mongodb, Inc. Distributed database systems and methods with pluggable storage engines
US11394532B2 (en) 2015-09-25 2022-07-19 Mongodb, Inc. Systems and methods for hierarchical key management in encrypted distributed databases
US10846411B2 (en) * 2015-09-25 2020-11-24 Mongodb, Inc. Distributed database systems and methods with encrypted storage engines
US20170262638A1 (en) * 2015-09-25 2017-09-14 Eliot Horowitz Distributed database systems and methods with encrypted storage engines
US11481289B2 (en) 2016-05-31 2022-10-25 Mongodb, Inc. Method and apparatus for reading and writing committed data
US11537482B2 (en) 2016-05-31 2022-12-27 Mongodb, Inc. Method and apparatus for reading and writing committed data
US10698775B2 (en) 2016-05-31 2020-06-30 Mongodb, Inc. Method and apparatus for reading and writing committed data
US11520670B2 (en) 2016-06-27 2022-12-06 Mongodb, Inc. Method and apparatus for restoring data from snapshots
US10776220B2 (en) 2016-06-27 2020-09-15 Mongodb, Inc. Systems and methods for monitoring distributed database deployments
US11544154B2 (en) 2016-06-27 2023-01-03 Mongodb, Inc. Systems and methods for monitoring distributed database deployments
US10866868B2 (en) 2017-06-20 2020-12-15 Mongodb, Inc. Systems and methods for optimization of database operations
US20220292061A1 (en) * 2021-03-15 2022-09-15 Vmware, Inc. Optimizing file access statistics collection
US11755537B2 (en) * 2021-03-15 2023-09-12 Vmware, Inc. Optimizing file access statistics collection

Also Published As

Publication number Publication date
IE20070392A1 (en) 2008-03-05
SG139626A1 (en) 2008-02-29
US8019790B2 (en) 2011-09-13
GB0712313D0 (en) 2007-08-01
DE102007026104B4 (en) 2023-02-02
GB0822628D0 (en) 2009-01-21
DE102007026104A1 (en) 2008-01-17
GB2440020B (en) 2009-06-24
GB2455424B (en) 2009-12-23
TW200807266A (en) 2008-02-01
CN101105808B (en) 2013-08-21
FR2904128A1 (en) 2008-01-25
GB2455424A (en) 2009-06-10
CN101105808A (en) 2008-01-16
GB2440020A (en) 2008-01-16
TWI368855B (en) 2012-07-21

Similar Documents

Publication Publication Date Title
US8019790B2 (en) System and method of dynamically changing file representations
US10146469B2 (en) Dynamic storage tiering based on predicted workloads
CA2910211C (en) Object storage using multiple dimensions of object information
US8521986B2 (en) Allocating storage memory based on future file size or use estimates
US9542306B2 (en) Dynamic storage device provisioning
US8407416B2 (en) Dynamic disk throttling in a wide area network optimization device
US12019532B2 (en) Distributed file system performance optimization for path-level settings using machine learning
US10956084B2 (en) Drive utilization in multi-tiered systems with read-intensive flash
US11494076B2 (en) Storage-usage-based host/storage mapping management system
Ignacio et al. Warmcache: A comprehensive distributed storage system combining replication, erasure codes and buffer cache
US11157322B2 (en) Hyper-converged infrastructure (HCI) ephemeral workload/data provisioning system
US20140281300A1 (en) Opportunistic Tier in Hierarchical Storage
US11921585B2 (en) Run-time selection of optimal commands for accessing serial access resources
US20230325257A1 (en) Workload measures based on access locality
US11868223B2 (en) Read-disturb-based read temperature information utilization system
Xu et al. Agility and performance in elastic distributed storage
CN103677757A (en) Method for controlling parallelism degree of program capable of sensing band width of storage device
Shenoy et al. Efficient Striping Techniques for Multimedia File Servers
Sundaram Self-managing techniques for storage resource management
Skourtis Providing predictable performance in Flash and black-box storage

Legal Events

Date Code Title Description
AS Assignment

Owner name: DELL PRODUCTS, LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GULBEDEN, AZIZ;RADHAKRISHNAN, RAMESH;REEL/FRAME:018057/0510

Effective date: 20060706

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TE

Free format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031898/0001

Effective date: 20131029

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TEXAS

Free format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031898/0001

Effective date: 20131029

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT (TERM LOAN);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031899/0261

Effective date: 20131029

Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT, TEXAS

Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:031897/0348

Effective date: 20131029

Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FI

Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:031897/0348

Effective date: 20131029

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: PATENT SECURITY AGREEMENT (TERM LOAN);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031899/0261

Effective date: 20131029

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: SECUREWORKS, INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: APPASSURE SOFTWARE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: PEROT SYSTEMS CORPORATION, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: DELL INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: FORCE10 NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: DELL MARKETING L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: COMPELLANT TECHNOLOGIES, INC., MINNESOTA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

Owner name: CREDANT TECHNOLOGIES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216

Effective date: 20160907

AS Assignment

Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: PEROT SYSTEMS CORPORATION, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: DELL MARKETING L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: APPASSURE SOFTWARE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: SECUREWORKS, INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: CREDANT TECHNOLOGIES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: FORCE10 NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: COMPELLENT TECHNOLOGIES, INC., MINNESOTA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: DELL INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001

Effective date: 20160907

Owner name: DELL MARKETING L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: PEROT SYSTEMS CORPORATION, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: FORCE10 NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: CREDANT TECHNOLOGIES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: SECUREWORKS, INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: DELL INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: APPASSURE SOFTWARE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

Owner name: COMPELLENT TECHNOLOGIES, INC., MINNESOTA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618

Effective date: 20160907

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001

Effective date: 20160907

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001

Effective date: 20160907

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001

Effective date: 20160907

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001

Effective date: 20160907

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T

Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223

Effective date: 20190320

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223

Effective date: 20190320

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001

Effective date: 20200409

AS Assignment

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: MOZY, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: MAGINATICS LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: FORCE10 NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: EMC IP HOLDING COMPANY LLC, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: EMC CORPORATION, MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL SYSTEMS CORPORATION, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL MARKETING L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL INTERNATIONAL, L.L.C., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: CREDANT TECHNOLOGIES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: AVENTAIL LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

AS Assignment

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL INTERNATIONAL L.L.C., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

AS Assignment

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL INTERNATIONAL L.L.C., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12